Articles about Security

Hackers going after Middle East banks

Faceless cyber criminal hacker

Researchers at the US cybersecurity company FireEye have discovered that hackers have begun to probe the defenses of banks in the Middle East by targeting bank employees with malware-infected emails to collect information about bank networks and user accounts.

The company started an investigation into the cyberattack in February in which hackers were able to steal $81 million from Bangladesh’s central bank. FireEye found no apparent connection between that attack and the similar attacks against banks in Vietnam and Ecuador. Currently in all three cases the hackers responsible for the attacks are unknown.

Continue reading

Hackers using bot armies for financial gain


A new security report by digital identity company ThreatMetrix says hackers are using a large army made out of "automated cyber robots", or bots, for financial gain.

Their Q1 2016 report, entitled Q1 Cybercrime Report, says there have been 311 million bot attacks detected and stopped in this year’s first quarter.

Continue reading

Edward Snowden warns about the dangers of using Google Allo


When Google announced the launch of two new messaging apps, the world wondered why. Duo is focused on video calling, while Allo is a more traditional messaging tool, albeit one with a Google assistant built in.

But while the world shrugged, Edward Snowden issued a stark warning. He says that Allo should be avoided, pointing out that the lack of end-to-end encryption makes it "dangerous".

Continue reading

Why IT departments never go on vacation

group young business it network server room solving help support

Admit it, we’ve all been thinking about the summer vacation since the blustery days of winter. Dreaming of destinations, looking at dates and ultimately, sending those out-of-office notices so that everyone knows we’re taking a break and heading out of town!

But while most of us are safe to switch those out-of-office messages on and tune out on our summer trips, IT is an industry that never truly gets a vacation. No matter the time of year, IT departments are always hard at work creating and maintaining the foundation of the modern business world. Among the top reasons why IT never goes on vacation, three are:

Continue reading

Consumers don't trust companies with their data, but they're willing to share personal info


Consumers in the EMEA region (Europe, Middle East, Africa) are fairly skeptical about companies keeping their data safe, but are willing to share personal information to get something in return anyway.

Those are the results of a new and extensive research by F5 Networks, which had asked more than 7,000 consumers in UK, Germany, France, Bene, United Arab Emirates, Saudi Arabia and Poland about their online shopping habits, and data attitudes.

Continue reading

European IT departments want to invest in cloud and security

Streaming video service Hang w/ shares its profits with users -- others take note!

Another confirmation of the heading IT departments are taking this year comes to us from tech giants Toshiba. After an extensive research into business practices in IT departments across Europe, it was found that cloud-based solutions (56 percent) and data security (50 percent) remain the biggest areas of investment for IT departments in the country this year.

The research shows results of a poll of 400 senior IT decision makers in the UK, France and Germany.

Continue reading

Medical devices targeted by cyber attacks

Medical data risk

Hacking and cyber attacks are no longer confined to computers. Thanks to the Internet of Things they affect a whole lot of other equipment too and that includes medical devices.

Application protection specialist Arxan has produced an infographic looking at the growing threat landscape surrounding connected medical devices.

Continue reading

Popular hacking site Nulled hit by cyberattackers, user info leaked

Faceless cyber criminal hacker

The email addresses and private messages of over 470,000 members of the popular hacking website Nulled have been leaked following a data breach.

The website served as a marketplace where its users could buy and sell the account details they stole from users along with hacking advice and tips. The data that was leaked from Nulled contained over 5,000 purchase records that detailed how the stolen information available on the site’s marketplace was exchanged between users.

Continue reading

Compliance struggles to keep pace with new communications channels

Why Confused Question Mark Woman Wall Puzzled

Compliance professionals need to supervise all types of business communications, but a new survey shows that they're struggling to keep pace with the volume and variety of electronic channels.

Hosted archiving specialist Smarsh has released its sixth annual Electronic Communications Compliance Survey Report. The survey, of compliance professionals in the financial services industry, highlights that supervision practices aren't sufficiently addressing the compliance implications of ongoing trends, like increased regulatory scrutiny and the challenge of adapting to channels like social media and text messaging.

Continue reading

The challenge of securing smart buildings from cyber attack [Q&A]

Tablet BYOD building

As more and more devices get added to the Internet of Things the risks they present get larger. A recent report from the BBC has highlighted the fact that buildings and their systems for heating, lighting and even security may be at risk.

We spoke to Péter Gyöngyösi, product manager of Blindspotter at contextual intelligence specialist Balabit, to find out more about the risks smart buildings present and how landlords and tenants can guard against them.

Continue reading

TeslaCrypt ransomware shuts up shop and releases free decryption key for everyone


Ransomware is not exactly a new problem, but it's one that seems to be getting increasingly serious. Every week there's a new high profile attack out there including the likes of CryptXXX and PETYA. One of the biggest names, TeslaCrypt, has suddenly thrown in the towel and offered up a free decryption key for its victims.

The surprise move comes just a couple of months after version 4 of TeslaCrypt gained what was described as "unbreakable encryption". The closure is somewhat bittersweet. The shutdown comes as attackers switch to using CryptXXX instead, but perhaps the most surprising aspect is the fact that the site formerly used to accept Bitcoin ransom payments is now where you'll find the decryption key needed to gain access to your files.

Continue reading

Four-year-old LinkedIn IDs go up for sale online


Cast your mind back to 2012 and the LinkedIn hack that had the grown up's social network scurrying to advise its users to change their passwords.

It was thought at the time that the 6.5 million sets of credentials posted on a Russian password forum was the extent of the breach. However, four years on a hacker under the name of 'Peace' is offering for sale a database of millions more LinkedIn accounts.

Continue reading

New breach detection platform is aimed at education sector

students university graduation

Thanks to their shifting population and the volume of personal and other valuable data that passes through them, universities have long been targets for cyber attacks.

With users that interact with a wider zone of the internet than any other group, university networks are particularly vulnerable to all types of attacks, from Trojan horse ploys to spear phishing.

Continue reading

McAfee's new security hub gives you tips on how to stay safe online

Microsoft's VC3 security is encryption for the cloud

Security experts at McAfee have unveiled a new cyber-security education hub, aimed at making people stay safer online. It is called the Ultimate Guide to Security Threats.

The security firm decided to create the hub after realizing that many people are still fairly uneducated when it comes to cyber-security. At the same time, cyber-crime is growing at an unprecedented rate.

Continue reading

How unsafe is the Internet of Things?

Internet of things

The Internet of Things is here to stay, but it presents a number of new security risks. Despite this, 81 percent of companies say they intend to roll out IoT devices by 2017.

This is according to research from DDoS mitigation specialist Neustar which has produced an infographic looking at the risks the IoT presents.

Continue reading

© 1998-2016 BetaNews, Inc. All Rights Reserved. Privacy Policy.